Besplatna dostava Overseas kurirskom službom iznad 59.99 €
Overseas 4.99 Pošta 4.99 DPD 5.99 GLS 3.99 GLS paketomat 3.49 Box Now 4.49

Besplatna dostava putem Box Now paketomata i Overseas kurirske službe iznad 59,99 €!

Automata, Languages and Programming

Knjiga Automata, Languages and Programming Luca Aceto
Libristo kod: 01568076
The two-volume set LNCS 5125 and LNCS 5126 constitutes the refereed proceedings of the 35th Internat... Cijeli opis
? points 304 b
121.11
Vanjske zalihe u manjem broju Šaljemo za 13-16 dana

30 dana za povrat kupljenih proizvoda


Moglo bi vas zanimati i


God-Shaped Brain Timothy R. Jennings / Meki uvez
common.buy 17.75
Melbourne & Victoria / Tvrdi uvez
common.buy 38.85
Bon Appetit! Peter Mayle / Meki uvez
common.buy 12.81
Gomer Goof Vol. 5: Goofball Season Franquin / Meki uvez
common.buy 8.27
La serenidad en tu hogar Kathleen Kendall Tackett / Meki uvez
common.buy 16.14
Klasik Türk Siirinde Nefs Ilyas Kayaokay / Meki uvez
common.buy 18.46
The Pineys: Book 2: Witch Piney Are You? Tony Digerolamo / Meki uvez
common.buy 10.08

The two-volume set LNCS 5125 and LNCS 5126 constitutes the refereed proceedings of the 35th International Colloquium on Automata, Languages and Programming, ICALP 2008, held in Reykjavik, Iceland, in July 2008.§The 126 revised full papers presented together with 4 invited lectures were carefully reviewed and selected from a total of 407 submissions. The papers are grouped in three major tracks on algorithms, automata, complexity and games, on logic, semantics, and theory of programming, and on security and cryptography foundations. LNCS 5126 contains 56 contributions of track B and track C selected from 208 submissions and 2 invited lectures. The papers for track B are organized in topical sections on bounds, distributed computation, real-time and probabilistic systems, logic and complexity, words and trees, nonstandard models of computation, reasoning about computation, and verification. The papers of track C cover topics in security and cryptography such as theory, secure computation, two-party protocols and zero-knowledge, encryption with special properties/quantum cryptography, various types of hashing, as well as public-key cryptography and authentication.

Poklonite ovu knjigu još danas
To je jednostavno
1 Dodajte knjigu u košaricu i odaberite isporuku kao poklon 2 Zauzvrat ćemo vam poslati kupon 3 Knjiga dolazi na adresu poklonoprimca

Prijava

Prijavite se na svoj račun. Još nemate Libristo račun? Otvorite ga odmah!

 
obvezno
obvezno

Nemate račun? Ostvarite pogodnosti uz Libristo račun!

Sve ćete imati pod kontrolom uz Libristo račun.

Otvoriti Libristo račun